SlideShare a Scribd company logo
1 of 8
Assignment Title: Cloud computing and its security
Coursework Type: Individual
Module Name: ST4059CEM Legal And Ethical
Foundations In Cyber Security Submitted By:
CU ID:
College ID: 220361
Submitted To: Name: Pratik Shrestha
Name: Adhisthan Gurung ABTRACTIONS
Cloud computing security refers to the measures and controls put in place to protect data, applications,
and infrastructure in a cloud environment. The responsibility of ensuring cloud computing security is
shared between the user and the cloud service provider. Different types of cloud environments include
public, private, hybrid, and community clouds. Security measures that can be implemented include
access controls, identity and access management, data encryption, network security, vulnerability
management, and compliance controls. Advantages of cloud computing security include scalability, cost-
effectiveness, flexibility, continuous monitoring, automatic updates, and expertise provided by cloud
security providers.
KEYWORDS
Cloud computing security, measures, controls, technologies, protect, information, applications,
infrastructure, cloud environment, safeguarding, unauthorized access, use, disclosure, disruption,
alteration, destruction, data, stored, compliance, regulations, cloud service provider, user, shared
responsibility, securing underlying infrastructure, securing own data, access, cloud, data encryption,
secure access control, network security, incident management, disaster recovery planning, types of
cloud environments, public cloud, infrastructure, services, general public, internet, Amazon Web
Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), private cloud, single organization,
typically operated on-premises, secure data center, hybrid cloud, combination, public and private cloud
environments, organization, benefits, sensitive workloads, community cloud, shared by multiple
organizations, specific community, shared concerns, security, compliance, jurisdiction, security
measures, access restrictions, identity and access management (IAM) controls, control access levels,
manage identities, people, devices, use cloud services, network security, guard against unwanted
access, attacks, cloud infrastructure, data, vulnerability management, stop assaults, find and fix
vulnerabilities, compliance and regulatory controls, benefits, scalability, cost-effectiveness, flexibility,
continuous monitoring, automatic updates, expertise, cloud security providers, address security
challenges
Outline
1. Introduction …………………………………………………………………………... 4
2. Types of cloud
3. SECURITY MEASURES
4. Advantages and Disadvantages of cloud computing
5. SUMMARY
INTRODUCTIONS
Cloud computing security is the set of measures, controls and technologies put in place to protect
information, applications, and infrastructure in a cloud environment. This includes safeguarding against
unauthorized access, use, disclosure, disruption, alteration or destruction of data stored on cloud. It also
includes ensuring compliance with regulations. Both the cloud service provider and the user share the
responsibility of ensuring cloud computing security. The provider is responsible for securing the
underlying infrastructure, while the user is responsible for securing their own data and access to the
cloud. It encompasses various aspects such as data encryption, secure access control, network security,
incident management, and disaster recovery planning.
There are various types of cloud environments, such as:
1. Public cloud: Public cloud, a type of cloud computing environment, provides infrastructure and
services that are easily accessible to the general public via the internet. This means that anyone can
access and use these resources without the need for special permissions or contracts. Leading providers
of public cloud services include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud
Platform (GCP). These providers offer a wide range of services such as virtual machines, storage,
databases, and networking which can be easily provisioned and scaled as needed. Ease of access and
scalability are major benefits of using public cloud. Public cloud providers typically offer a self-service
model, allowing customers to easily provision and manage resources without the need for IT support.
This makes it a great option for businesses of all sizes, as they can easily scale their resources up or
down as needed.
2. Private cloud: A private cloud is a type of cloud computing that combines the benefits of public
clouds, such as scalability and self-service, with added control, security, and privacy. Unlike
public clouds, which are managed by third-party providers, a private cloud's infrastructure and
services are typically owned and operated by the organization that uses them. This allows the
organization to have more control over the security and configuration of the cloud
environment, and to ensure that data and applications hosted in the cloud are kept secure.
Key features of a private cloud include:
a. Dedicated resources: The servers, storage, and networking used in a private cloud are usually
dedicated to the organization that owns them, providing more control over performance and
capacity.
b. Enhanced security: A private cloud is typically located on-premises or within a secure data
center, offering a higher level of security than a public cloud.
c. Compliance options: A private cloud can be configured to meet specific compliance
requirements, such as data privacy regulations.
d. Customization: A private cloud can be tailored to the specific needs of the organization, with
custom APIs or specialized management tools.It's important to note that private clouds can be more
costly to set up and maintain than public clouds, and they may also be more complex to
manage. Organizations should carefully evaluate their needs and resources before deciding to
implement a private cloud.
3. Hybrid cloud: A hybrid cloud is a type of computing environment that combines the use of both
private and public cloud resources. This allows organizations to run certain workloads on a
public cloud while utilizing a private cloud for others. By using a hybrid cloud strategy,
companies can take advantage of the benefits offered by public clouds such as scalability, cost-
efficiency, and flexibility while also maintaining the security, control, and compliance options of
a private cloud.
Key characteristics of a hybrid cloud include:
Flexibility: A hybrid cloud allows businesses to choose the best environment for each workload,
whether it's on-premises, in the public cloud, or in a private cloud. This can help businesses
optimize the use of their resources and improve overall efficiency.
4. Multi clouds: Multi-cloud is a cloud computing strategy in which an organization uses multiple
cloud services from different providers, rather than relying on a single provider. Multi-cloud
offers several benefits such as increased flexibility, reduced vendor lock-in, improved cost
management, better disaster recovery and enhanced security. However, it also poses
challenges such as complexity in management, security, compliance and integration. Therefore,
it is essential for organizations to have a well-planned strategy and a dedicated team to
effectively manage multi-cloud deployments.
In summary, Multi-cloud is a cloud computing strategy that allows businesses to use multiple cloud
services from various providers. It offers benefits such as increased flexibility, reduced vendor
lock-in and improved cost management, but it also poses challenges such as complexity in
management,
security, compliance and integration. A well-planned strategy and a dedicated team are essential
for effectively managing multi-cloud deployments.
SECURITY MEASURES
There are several types of security measures that can be implemented in cloud computing
environments, including:
1.Cloud computing environments require a range of security measures to protect data and resources.
Access restrictions are controls and limitations that determine who can access the cloud network. This
can include user authentication and authorization, which verify the identity of users and ensure they
have the necessary permissions to access the data. Firewalls, intrusion detection systems, and intrusion
prevention systems are also used to secure the network. They monitor network traffic and block
unauthorized access attempts.
2.Identity and Access Management (IAM) controls are used to manage user identities and access levels
to cloud services. This involves creating user accounts and assigning permissions to users. Single sign-on
(SSO) and multi-factor authentication (MFA) tools can also be used to provide safe access to the cloud
services. SSO allows users to access multiple cloud services with one set of login credentials, while MFA
adds an extra layer of security by requiring users to provide multiple forms of identification.
3.Data encryption is another important security measure in cloud computing environments. Encrypting
data before it is stored ensures that it is protected both in transit and at rest. This is
particularly important for sensitive information, such as financial data or personal
information, as it prevents unauthorized access to the data even if it is intercepted or stolen.
ADVANTAGES OF CLOUD COMPUTING
Benefits of cloud computing security include:
1. Scalability: Cloud computing allows businesses to easily scale their resources up or down as
needed to accommodate changes in demand or usage. This can be particularly beneficial
for organizations that experience cyclical or seasonal fluctuations in usage.
2. Cost-efficiency: Cloud computing eliminates the need for businesses to invest in costly
hardware and infrastructure, making it a more cost-effective solution than traditional on-
premises options. The costs associated with maintaining and upgrading hardware are also
reduced.
3. Flexibility: Cloud computing enables organizations to quickly access and utilize a wide range
of services and resources from any location with an internet connection. This allows for
greater flexibility in terms of remote working and expanding into new markets.
4. Continuous monitoring: Cloud computing service providers often provide tools and services
that enable continuous monitoring and logging of activities, which can speed up the
detection and response to security incidents by businesses.
5. Automatic updates: Cloud computing providers automatically receive updates and patches,
ensuring that the latest security measures are always in place.
6. Expertise: Cloud computing companies have expertise in securing the cloud environment
and can assist businesses with security issues.
7. Improved disaster recovery: Cloud computing providers often provide disaster recovery
solutions that can help organizations quickly restore access to data and applications in
the event of an outage or other disaster.
8. Improved collaboration: Cloud computing enables multiple users to work on the same data,
documents, and projects, improving collaboration and productivity.
9.
Disadvantage of cloud computing Cons of cloud computing include:
1. Security risks: Storing data and running applications on a third-party's servers may raise security
concerns. Businesses may be at risk of data breaches, unauthorized access, and loss of control over
their data.
2. Internet connection dependency: Cloud computing relies on a stable and fast internet
connection. In the event of an internet outage, access to data and applications may be lost.
3. Limited control over service: Organizations may have limited control over the configuration and
management of the cloud services they use. This can make it difficult to customize the service
to meet specific business needs.
4. Limited ability to audit: Organizations may have limited ability to audit the cloud service
provider's security and compliance practice
5. Compliance and regulatory issues: Some industries have specific compliance and
regulatory requirements that may not be fully supported by all cloud service providers.
BET CLOUD PROVIDERS
SUMMARY
Cloud computing technology enables enterprises to utilize servers owned and maintained by a
third- party provider to store, process, and run applications remotely. This offers many benefits
such as scalability, cost efficiency, accessibility, and improved collaboration. However, it also poses
security challenges.
Securing cloud computing environments is vital as it helps protect sensitive information and data that
is stored and processed in the cloud. This includes personal information, financial data, confidential
business information, and other sensitive data that must be protected from unauthorized access,
misuse, and disclosure. Many organizations also place a high importance on compliance with
regulatory requirements.

More Related Content

Similar to legal and ethical.ppt

A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniquesijcsa
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issuesJahangeer Qadiree
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud securityArun Gopinath
 
Ast 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAst 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAccenture
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesIJCSIS Research Publications
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDSweta Kumari Barnwal
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfDataSpace Academy
 
Cloud implementation security challenges
Cloud implementation security challengesCloud implementation security challenges
Cloud implementation security challengesbornresearcher
 
Cloud Computing Lecture 02.pptx
Cloud Computing Lecture 02.pptxCloud Computing Lecture 02.pptx
Cloud Computing Lecture 02.pptxboti39263
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfProtelion
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfProtelion
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the CloudCloudSmartz
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 

Similar to legal and ethical.ppt (20)

A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Ast 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAst 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_security
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
cloud1_aggy.pdf
cloud1_aggy.pdfcloud1_aggy.pdf
cloud1_aggy.pdf
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
 
Cloud implementation security challenges
Cloud implementation security challengesCloud implementation security challenges
Cloud implementation security challenges
 
Cloud Computing Lecture 02.pptx
Cloud Computing Lecture 02.pptxCloud Computing Lecture 02.pptx
Cloud Computing Lecture 02.pptx
 
3822424.ppt
3822424.ppt3822424.ppt
3822424.ppt
 
1784 1788
1784 17881784 1788
1784 1788
 
1784 1788
1784 17881784 1788
1784 1788
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 

Recently uploaded

FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answersdalebeck957
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 

legal and ethical.ppt

  • 1. Assignment Title: Cloud computing and its security Coursework Type: Individual Module Name: ST4059CEM Legal And Ethical Foundations In Cyber Security Submitted By: CU ID: College ID: 220361 Submitted To: Name: Pratik Shrestha Name: Adhisthan Gurung ABTRACTIONS Cloud computing security refers to the measures and controls put in place to protect data, applications, and infrastructure in a cloud environment. The responsibility of ensuring cloud computing security is shared between the user and the cloud service provider. Different types of cloud environments include public, private, hybrid, and community clouds. Security measures that can be implemented include access controls, identity and access management, data encryption, network security, vulnerability management, and compliance controls. Advantages of cloud computing security include scalability, cost- effectiveness, flexibility, continuous monitoring, automatic updates, and expertise provided by cloud security providers. KEYWORDS Cloud computing security, measures, controls, technologies, protect, information, applications, infrastructure, cloud environment, safeguarding, unauthorized access, use, disclosure, disruption, alteration, destruction, data, stored, compliance, regulations, cloud service provider, user, shared responsibility, securing underlying infrastructure, securing own data, access, cloud, data encryption, secure access control, network security, incident management, disaster recovery planning, types of cloud environments, public cloud, infrastructure, services, general public, internet, Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), private cloud, single organization, typically operated on-premises, secure data center, hybrid cloud, combination, public and private cloud environments, organization, benefits, sensitive workloads, community cloud, shared by multiple organizations, specific community, shared concerns, security, compliance, jurisdiction, security measures, access restrictions, identity and access management (IAM) controls, control access levels, manage identities, people, devices, use cloud services, network security, guard against unwanted access, attacks, cloud infrastructure, data, vulnerability management, stop assaults, find and fix vulnerabilities, compliance and regulatory controls, benefits, scalability, cost-effectiveness, flexibility, continuous monitoring, automatic updates, expertise, cloud security providers, address security challenges
  • 2. Outline 1. Introduction …………………………………………………………………………... 4 2. Types of cloud 3. SECURITY MEASURES 4. Advantages and Disadvantages of cloud computing 5. SUMMARY INTRODUCTIONS Cloud computing security is the set of measures, controls and technologies put in place to protect information, applications, and infrastructure in a cloud environment. This includes safeguarding against unauthorized access, use, disclosure, disruption, alteration or destruction of data stored on cloud. It also includes ensuring compliance with regulations. Both the cloud service provider and the user share the responsibility of ensuring cloud computing security. The provider is responsible for securing the underlying infrastructure, while the user is responsible for securing their own data and access to the cloud. It encompasses various aspects such as data encryption, secure access control, network security, incident management, and disaster recovery planning. There are various types of cloud environments, such as: 1. Public cloud: Public cloud, a type of cloud computing environment, provides infrastructure and services that are easily accessible to the general public via the internet. This means that anyone can access and use these resources without the need for special permissions or contracts. Leading providers of public cloud services include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). These providers offer a wide range of services such as virtual machines, storage, databases, and networking which can be easily provisioned and scaled as needed. Ease of access and scalability are major benefits of using public cloud. Public cloud providers typically offer a self-service model, allowing customers to easily provision and manage resources without the need for IT support. This makes it a great option for businesses of all sizes, as they can easily scale their resources up or down as needed. 2. Private cloud: A private cloud is a type of cloud computing that combines the benefits of public clouds, such as scalability and self-service, with added control, security, and privacy. Unlike public clouds, which are managed by third-party providers, a private cloud's infrastructure and services are typically owned and operated by the organization that uses them. This allows the organization to have more control over the security and configuration of the cloud environment, and to ensure that data and applications hosted in the cloud are kept secure.
  • 3. Key features of a private cloud include: a. Dedicated resources: The servers, storage, and networking used in a private cloud are usually dedicated to the organization that owns them, providing more control over performance and capacity. b. Enhanced security: A private cloud is typically located on-premises or within a secure data center, offering a higher level of security than a public cloud. c. Compliance options: A private cloud can be configured to meet specific compliance requirements, such as data privacy regulations. d. Customization: A private cloud can be tailored to the specific needs of the organization, with custom APIs or specialized management tools.It's important to note that private clouds can be more costly to set up and maintain than public clouds, and they may also be more complex to manage. Organizations should carefully evaluate their needs and resources before deciding to implement a private cloud. 3. Hybrid cloud: A hybrid cloud is a type of computing environment that combines the use of both private and public cloud resources. This allows organizations to run certain workloads on a public cloud while utilizing a private cloud for others. By using a hybrid cloud strategy, companies can take advantage of the benefits offered by public clouds such as scalability, cost- efficiency, and flexibility while also maintaining the security, control, and compliance options of a private cloud. Key characteristics of a hybrid cloud include: Flexibility: A hybrid cloud allows businesses to choose the best environment for each workload, whether it's on-premises, in the public cloud, or in a private cloud. This can help businesses optimize the use of their resources and improve overall efficiency. 4. Multi clouds: Multi-cloud is a cloud computing strategy in which an organization uses multiple cloud services from different providers, rather than relying on a single provider. Multi-cloud offers several benefits such as increased flexibility, reduced vendor lock-in, improved cost management, better disaster recovery and enhanced security. However, it also poses challenges such as complexity in management, security, compliance and integration. Therefore, it is essential for organizations to have a well-planned strategy and a dedicated team to effectively manage multi-cloud deployments. In summary, Multi-cloud is a cloud computing strategy that allows businesses to use multiple cloud services from various providers. It offers benefits such as increased flexibility, reduced vendor lock-in and improved cost management, but it also poses challenges such as complexity in management,
  • 4. security, compliance and integration. A well-planned strategy and a dedicated team are essential for effectively managing multi-cloud deployments. SECURITY MEASURES There are several types of security measures that can be implemented in cloud computing environments, including: 1.Cloud computing environments require a range of security measures to protect data and resources. Access restrictions are controls and limitations that determine who can access the cloud network. This can include user authentication and authorization, which verify the identity of users and ensure they have the necessary permissions to access the data. Firewalls, intrusion detection systems, and intrusion prevention systems are also used to secure the network. They monitor network traffic and block unauthorized access attempts. 2.Identity and Access Management (IAM) controls are used to manage user identities and access levels to cloud services. This involves creating user accounts and assigning permissions to users. Single sign-on (SSO) and multi-factor authentication (MFA) tools can also be used to provide safe access to the cloud services. SSO allows users to access multiple cloud services with one set of login credentials, while MFA adds an extra layer of security by requiring users to provide multiple forms of identification. 3.Data encryption is another important security measure in cloud computing environments. Encrypting data before it is stored ensures that it is protected both in transit and at rest. This is
  • 5. particularly important for sensitive information, such as financial data or personal information, as it prevents unauthorized access to the data even if it is intercepted or stolen. ADVANTAGES OF CLOUD COMPUTING Benefits of cloud computing security include: 1. Scalability: Cloud computing allows businesses to easily scale their resources up or down as needed to accommodate changes in demand or usage. This can be particularly beneficial for organizations that experience cyclical or seasonal fluctuations in usage. 2. Cost-efficiency: Cloud computing eliminates the need for businesses to invest in costly hardware and infrastructure, making it a more cost-effective solution than traditional on- premises options. The costs associated with maintaining and upgrading hardware are also reduced. 3. Flexibility: Cloud computing enables organizations to quickly access and utilize a wide range of services and resources from any location with an internet connection. This allows for greater flexibility in terms of remote working and expanding into new markets. 4. Continuous monitoring: Cloud computing service providers often provide tools and services that enable continuous monitoring and logging of activities, which can speed up the detection and response to security incidents by businesses. 5. Automatic updates: Cloud computing providers automatically receive updates and patches, ensuring that the latest security measures are always in place. 6. Expertise: Cloud computing companies have expertise in securing the cloud environment and can assist businesses with security issues.
  • 6. 7. Improved disaster recovery: Cloud computing providers often provide disaster recovery solutions that can help organizations quickly restore access to data and applications in the event of an outage or other disaster. 8. Improved collaboration: Cloud computing enables multiple users to work on the same data, documents, and projects, improving collaboration and productivity. 9. Disadvantage of cloud computing Cons of cloud computing include: 1. Security risks: Storing data and running applications on a third-party's servers may raise security concerns. Businesses may be at risk of data breaches, unauthorized access, and loss of control over their data. 2. Internet connection dependency: Cloud computing relies on a stable and fast internet connection. In the event of an internet outage, access to data and applications may be lost. 3. Limited control over service: Organizations may have limited control over the configuration and management of the cloud services they use. This can make it difficult to customize the service to meet specific business needs.
  • 7. 4. Limited ability to audit: Organizations may have limited ability to audit the cloud service provider's security and compliance practice 5. Compliance and regulatory issues: Some industries have specific compliance and regulatory requirements that may not be fully supported by all cloud service providers. BET CLOUD PROVIDERS SUMMARY Cloud computing technology enables enterprises to utilize servers owned and maintained by a third- party provider to store, process, and run applications remotely. This offers many benefits such as scalability, cost efficiency, accessibility, and improved collaboration. However, it also poses security challenges.
  • 8. Securing cloud computing environments is vital as it helps protect sensitive information and data that is stored and processed in the cloud. This includes personal information, financial data, confidential business information, and other sensitive data that must be protected from unauthorized access, misuse, and disclosure. Many organizations also place a high importance on compliance with regulatory requirements.